![]() A security vulnerability results because it is possible for a malicious user to construct an attack that could exploit this flaw and execute code on the users system.Īn attacker could seek to exploit this vulnerability by creating a Desktop.ini file that contains a corrupt custom attribute, and then host it on a network share. It also provides a variety of other functions to help define the user's computing session, including organizing files and folders, and providing the means to start programs.Īn unchecked buffer exists in one of the functions used by the Windows shell to extract custom attribute information from certain folders. It is most familiar to users as the Windows desktop. The Windows shell is responsible for providing the basic framework of the Windows user interface experience. ![]() This is the Microsoft Windows XP Embedded with Service Pack 1 component update to address MS03-027: Unchecked Buffer in Windows Shell Could Enable System Compromise (821557).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |